1 / 31

Lesson 15 : Networks And The Internet

Lesson 15 : Networks And The Internet. At the end of this lesson, students should be able to;. Communicate using Internet Relay Chat (IRC). . Observe safety precautions when communicating online. Describe the need for cyber law. Define website. List web design software. ACTIVITY 1 :

skimball
Download Presentation

Lesson 15 : Networks And The Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lesson 15 :Networks And The Internet

  2. At the end of this lesson, students should be able to; • Communicate using Internet Relay Chat (IRC).. • Observe safety precautions when communicating online. • Describe the need for cyber law. • Define website. • List web design software.

  3. ACTIVITY 1 : COMMUNICATING USING INTERNET ( mIRC)

  4. IRC

  5. IRC (Internet Relay Chat) • Internet Relay Chat (IRC) is a form of real-time Internet text messaging (chat) or synchronous conferencing. • It is mainly designed for group communication in discussion forums, but also allows one-to-one communication and data transfers

  6. mIRC Example of IRC

  7. skype

  8. Yahoo messenger

  9. skype

  10. Observe safety precautions when communicating online. • Never give out your personal information in a chat room. • Never agree to meet a stranger in person whom you met in a chat room. • Remember your Netiquette and be nice!

  11. Chatting with mIRC 2. Select Channel Room to start chatting (#Beginner) 1. Click Connection / Disconnect Icon to connect mIRC 3. Click OK

  12. Continue…. 4. Select the “chatter in room” in “Beginner Channel” to start chatting (kenali, reeena, P00r-girl)

  13. Continue…. 5. Chatting is doing when to type the message text

  14. Continue…. 6. Reply text message from members

  15. Internet communication abuse SPAM hacking sending virus via e-mail

  16. What is Cyber Law? • Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.

  17. The Malaysian Government has already passed severalcyber laws to control and reduce Internet communication abuse

  18. These cyber laws include: • Digital Signature Act 1997 • Computer Crimes Act 1997 • Telemedicine Act 1997 • Communications and Multimedia Act 1998

  19. Digital Signature Act 1997 • Digital Signature is an identity verification standard that uses encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message. • By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data.

  20. Computer Crimes Act 1997 • Gives protection against the misuse of computers and computer criminal activities such as unauthorized use of programmed, illegal transmission of data or messages over computers, hacking and cracking of computer systems and networks. • Users can protect their rights to privacy and build trust in the computer system. • The government can have control at a certain level over cyberspace to reduce cyber crime activities.

  21. Telemedicine Act 1997 • The Telemedicine Act 1997 ensures that only qualified medical practitioners can practice telemedicine and that their patient's rights and interests are protected. • This act provides future development and delivery of healthcare in Malaysia.

  22. Communications And Multimedia Act 1998 • The implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is reliable and affordable all over Malaysia.

  23. Needs for Cyber Law • Integrity and Security of Information • Legal Status of Online Transactions • Security of Government Data • Privacy and Confidentially of Information • Intellectual Property Rights

  24. Examples of Cyber abuse on the users • sending a computer virus via e-mail • hacking into your school’s database to change your examination results. • selling pirated software in a night market

  25. DEFINITION A website (also spelled Website or web site) is a collection of related web pages, images, videos or other digital assets that are addressed with a common domain name or IP address in an Internet Protocol-based network.

  26. Website ( World Wide Web / www )

  27. Examples of Web Design Software • FrontPage • Macromedia Flash • Macromedia Dreamweaver • Microsoft Office Word

  28. Microsoft FrontPage

  29. Macromedia Flash

  30. Macromedia Dreamweaver

  31. Microsoft Office Word

More Related